Automatic verification of conformance of firewall configurations to security policies.
Nihel Ben YoussefAdel BouhoulaFlorent JacquemardPublished in: ISCC (2009)
Keyphrases
- security policies
- network security
- unauthorized access
- packet filtering
- security management
- access control
- intrusion detection
- intrusion detection system
- security requirements
- network traffic
- distributed systems
- computer networks
- access control systems
- anomaly detection
- access control policies
- security concerns
- information security
- home network
- multilevel secure
- model based testing